Unlock instant, AI-driven research and patent intelligence for your innovation.

Security privacy protection method and system based on ECC encryption

A privacy protection system and privacy protection technology, applied in key distribution, can solve the problems of user privacy data leakage, illegal devices accessing network services, and secure communications that are easily overcome and cracked by eavesdroppers, to achieve the effect of ensuring data security.

Inactive Publication Date: 2016-01-06
SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI
View PDF6 Cites 3 Cited by
  • Summary
  • Abstract
  • Description
  • Claims
  • Application Information

AI Technical Summary

Problems solved by technology

However, because the encryption scheme uses a fixed key pair, whether it is user encrypted registration or subsequent secure communication, it is easy to be cracked by eavesdroppers, resulting in unsafe events such as user privacy data leakage and illegal device access to network services.

Method used

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
View more

Image

Smart Image Click on the blue labels to locate them in the text.
Viewing Examples
Smart Image
  • Security privacy protection method and system based on ECC encryption
  • Security privacy protection method and system based on ECC encryption
  • Security privacy protection method and system based on ECC encryption

Examples

Experimental program
Comparison scheme
Effect test

Embodiment Construction

[0037] The implementation of the present invention is described below through specific examples and in conjunction with the accompanying drawings, and those skilled in the art can easily understand other advantages and effects of the present invention from the content disclosed in this specification. The present invention can also be implemented or applied through other different specific examples, and various modifications and changes can be made to the details in this specification based on different viewpoints and applications without departing from the spirit of the present invention.

[0038] figure 1 It is a flow chart of steps of an ECC encryption-based security and privacy protection method of the present invention. Such as figure 1 Shown, a kind of security privacy protection method based on ECC encryption of the present invention comprises the following steps:

[0039] Step 101, the client device applies for registration to the central office device, and provides t...

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

PUM

No PUM Login to View More

Abstract

The invention discloses a security privacy protection method and system based on ECC encryption. The method comprises the following steps: user equipment applies for registration from local terminal equipment; the local terminal equipment judges the mutual relevance of keys and the consistency of MAC addresses, generates a random authorization key if judging the keys as being legal, encrypts the random authorization key through a public key and sends the encrypted authorization key and a registration success message to the user equipment; the user equipment decrypts and stores the encrypted authorization key through a unified public key and applies a communication key from the local terminal equipment; the local terminal equipment generates a random communication key, encrypted the communication key through the generated authorization key and sends the encrypted communication key and an application reply of the communication key to the user equipment; and the user equipment decrypts the received encrypted communication key, and then the user equipment and the local terminal equipment encrypt and decrypt interactive data communication through the communication key.

Description

technical field [0001] The present invention relates to a security and privacy encryption technology based on ECC (Elliptic Curves Cryptography, elliptic curve cryptography), in particular to a security and privacy protection method and system based on ECC encryption. Background technique [0002] EOC is the abbreviation of Ethernet Over Cable (Ethernet Over Cable), that is, based on coaxial cables, various digital modulation technologies are used to carry Ethernet and other comprehensive services. Due to the urgent need for triple play in the national strategy, and EOC is one of the key technologies for triple play, more and more chip and equipment manufacturers have invested in the research and development of EOC systems. However, although various EOC systems have their own advantages in speed, anti-noise and anti-interference, they are still not perfect in terms of communication security. [0003] For the access authentication of different networks of the same device, th...

Claims

the structure of the environmentally friendly knitted fabric provided by the present invention; figure 2 Flow chart of the yarn wrapping machine for environmentally friendly knitted fabrics and storage devices; image 3 Is the parameter map of the yarn covering machine
Login to View More

Application Information

Patent Timeline
no application Login to View More
IPC IPC(8): H04L9/30H04L9/08H04L29/06
Inventor 车光宁张钊锋庄健敏封松林
Owner SHANGHAI ADVANCED RES INST CHINESE ACADEMY OF SCI